This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote SuSE 9 host is missing a security-related patch.
The transaction id and the udp source port used for DNS queries by the
bind nameserver were predictable. Attackers could potentially exploit
that weakness to manipulate the DNS cache ('DNS cache poisoning',
Additionally the root.hint zone file was updated to contain the new IP
number of the 'L' root DNS server.
See also :
Apply YOU patch number 12197.
Risk factor :
Medium / CVSS Base Score : 6.4